Research Directions in Wireless Security


We consider the problem of generating a shared secret key S between two parties over wireless channels, in the presence of an eavesdropping adversary. We focus on information theoretic approaches that, in contrast to existing cryptographic solutions, aim to solve this problem without making any assumptions about the adversary’s computational capabilities… (More)

2 Figures and Tables


  • Presentations referencing similar topics